Want to know Testking 400 101 vce Exam practice test features? Want to lear more about Cisco CCIE Routing and Switching (v5.0) certification experience? Study Tested Cisco 400 101 pdf answers to Improve 400 101 dumps questions at Testking. Gat a success with an absolute guarantee to pass Cisco ccie 400 101 dumps (CCIE Routing and Switching (v5.0)) test on your first attempt.

Q341. Which option is the result if two adjacent routers are configured for OSPF with different process IDs? 

A. The routers are unable to establish an adjacency. 

B. The routers establish an adjacency, but route exchange fails. 

C. The routers establish an adjacency and exchange routes, but the routes are unreachable. 

D. The routers establish an adjacency and exchange routes, and the routes are reachable. 

Answer:


Q342. Which packet does a router receive if it receives an OSPF type 4 packet? 

A. hello packet 

B. database descriptor packet 

C. link state update packet 

D. link state request packet 

E. link state acknowledge packet 

Answer:


Q343. Which three steps are necessary to enable SSH? (Choose three.) 

A. generating an RSA or DSA cryptographic key 

B. configuring the version of SSH 

C. configuring a domain name 

D. configuring VTY lines for use with SSH 

E. configuring the port for SSH to listen for connections 

F. generating an AES or SHA cryptographic key 

Answer: A,C,D 

Explanation: 

Here are the steps: 

1. Configure a hostname for the router using these commands. 

yourname#configure terminal 

Enter configuration commands, one per line. End with CNTL/Z. 

yourname (config)#hostname LabRouter 

LabRouter(config)# 

2. Configure a domain name with the ip domain-name command followed by whatever you would like your domain name to be. I used CiscoLab.com. 

LabRouter(config)#ip domain-name CiscoLab.com 

3. We generate a certificate that will be used to encrypt the SSH packets using the crypto key generate rsa command. 

Take note of the message that is displayed right after we enter this command. “The name for the keys will bE. LabRouter.CiscoLab.com” — it combines the hostname of the router along with the domain name we configured to get the name of the encryption key generated; this is why it was important for us to, first of all, configure a hostname then a domain name before we generated the keys. 

Notice also that it asks us to choose a size of modulus for the key we’re about to generate. 

The higher the modulus, the stronger the encryption of the key. For our example, we’ll use a modulus of 1024. 


Q344. Which two statements about static NAT are true? (Choose two.) 

A. An outside local address maps to the same outside global IP address. 

B. An inside local address maps to a different inside global IP address. 

C. An outside local address maps to a different outside global IP address. 

D. An inside local address maps to the same inside global IP address. 

Answer: A,D 

Explanation: 

Example found at the reference link below: Reference: http://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/4606-8.html 


Q345. DRAG DROP 

Drag and drop the IGMPv2 timer on the left to its default value on the right. 

Answer: 


Q346. Which VPN technology requires the use of an external key server? 

A. GETVPN 

B. GDOI 

C. SSL 

D. DMVPN 

E. IPsec F. L2TPv3 

Answer:

Explanation: 

A GETVPN deployment has primarily three components, Key Server (KS), Group Member (GM), and Group Domain of Interpretation (GDOI) protocol. GMs do encrypt/decrypt the traffic and KS distribute the encryption key to all the group members. The KS decides on one single data encryption key for a given life time. Since all GMs use the same key, any GM can decrypt the traffic encrypted by any other GM. GDOI protocol is used between the GM and KS for group key and group SA management. Minimum one KS is required for a GETVPN deployment. 

Reference: http://www.cisco.com/c/en/us/products/collateral/security/group-encrypted-transport-vpn/deployment_guide_c07_554713.html 


Q347. Which two options are causes of out-of-order packets? (Choose two.) 

A. a routing loop 

B. a router in the packet flow path that is intermittently dropping packets 

C. high latency 

D. packets in a flow traversing multiple paths through the network 

E. some packets in a flow being process-switched and others being interrupt-switched on a transit router 

Answer: D,E 

Explanation: 

In traditional packet forwarding systems, using different paths have varying latencies that cause out of order packets, eventually resulting in far lower performance for the network application. Also, if some packets are process switched quickly by the routing engine of the router while others are interrupt switched (which takes more time) then it could result in out of order packets. The other options would cause packet drops or latency, but not out of order packets. 


Q348. A configuration includes the line ip route 10.0.0.0 255.0.0.0 172.16.10.10 permanent. 

Which option is a benefit of configuring this static route as permanent? 

A. It allows the route to be redistributed into the network even if the outgoing interface is down. 

B. It allows the route to be saved in the running configuration of the device. 

C. It places a hidden tag on the route that can be matched on other devices. 

D. It allows the route to have a tracking status even if no tracking object is configured. 

Answer:


Q349. Which statement about LISP encapsulation in an EIGRP OTP implementation is true? 

A. OTP uses LISP encapsulation for dynamic multipoint tunneling. 

B. OTP maintains the LISP control plane. 

C. OTP uses LISP encapsulation to obtain routes from neighbors. 

D. LISP learns the next hop. 

Answer:


Q350. Refer to the exhibit. 

Which two statements about the VPN solution are true? (Choose two.) 

A. Customer A and customer B will exchange routes with each other. 

B. R3 will advertise routes received from R1 to R2. 

C. Customer C will communicate with customer A and B. 

D. Communication between sites in VPN1 and VPN2 will be blocked. 

E. R1 and R2 will receive VPN routes advertised by R3. 

Answer: C,E 

Explanation: 

+ VPN1 exports 10:1 while VPN3 imports 10:1 so VPN3 can learn routes of VPN1. 

+ VNP1 imports 10:1 while VNP3 export 10:1 so VNP1 can learn routes of VPN3. 

-> Customer A can communicate with Customer C 

+ VPN2 exports 20:1 while VPN3 imports 20:1 so VPN3 can learn routes of VPN2. 

+ VPN2 imports 20:1 while VPN3 exports 20:1 so VPN2 can learn routes of VPN3. 

-> Customer B can communicate with Customer C 

Therefore answer C is correct. 

Also answer E is correct because R1 & R2 import R3 routes. 

Answer A is not correct because Customer A & Customer B do not import routes which are exported by other router. Customer A & B can only see Customer C. 

Answer B is not correct because a router never exports what it has learned through importation. It only exports its own routes. 

Answer D is correct because two VPN1 and VPN2 cannot see each other. Maybe in this question there are three correct answers.